Vandis Insights - IT and Cloud Computing News

Filtering By Tag 'Monitoring'

Almost all security breaches originate at the endpoint for several reasons: they are the most mobile, and they utilize the most applications. Not surprisingly, the human element of the endpoint also makes it the most vulnerable point of entry for an assault. Adversaries continue to invent novel ways to combat new security protocols, and in today's environment, the attack cadence is off the charts. That is to say; there are constant attacks – both file-based and non-file-based – hitting networks from every possible direction.

Surveys indicate that under normal circumstances, 57% of issues are detected by end users before IT personnel are aware of them. Moreover, 34% of end users cite poor network connectivity or poor web/cloud/SaaS performance at their workplace. With this data in mind, it should come as no surprise that one of the top three gripes end users have about their IT department is reduced app viability.